The CENTCOM Twitter Hack

By now, most readers of this blog are well aware that, for a brief period of time yesterday, ISIS cyber warriors (going under the hashtag #CyberCaliphate) took control of the CENTCOM Twitter and You-Tube accounts. Twitter and You-Tube are, of course,…
Cyber Supply Chain Security

Cyber Supply Chain Security

There are many ways to think about enhancing cybersecurity. One, for example, is the prospect of software liability, which would, drive safer code. There are many ways to think about enhancing cybersecurity. One, for example, is the prospect of…